Technology acceptance as an influencing factor of hospital employees’ compliance with data‐protection standards in Germany

AimData-protection regulations in German hospitals, based on data-protection laws and internal regulations, must be complied with and taken into account in daily work. However, these regulations are not always respected, as evidenced by the data-protection scandals in Germany of recent years.Subjects and methodsIn a 2010 survey, data was collected from 557 individuals including administrative staff, nursing staff, physicians, physicians with scientific/research-based work and other health professionals of 26 hospitals in Germany to analyze the factors of relevance with regard to data-protection compliance.ResultsThe acceptance of hospital staff concerning data-protection regulations is significantly influenced by subjective values and personal attitudes. Significant differences related to the acceptance of data-protection rules and regulations can be found in gender or type of hospital. The results show that employees consider rules and regulations to be necessary and important. However damage caused by data security breaches and the likelihood that they will occur, are considered to be less significant. A large impact on individual data-protection compliance can be reported in the subjective norm, which is influenced by the effect of close colleagues and superiors.ConclusionThe underlying results of the study at hand demonstrate practical implications which can lead to a high degree of data-protection compliance in the future. The related aspects deserving future investigation of the possible explanations for differences in behavior related to data protection among various occupational groups in hospitals are discussed. Men and women exhibit very different levels of data-protection acceptance, so future efforts to increase sensitivity and awareness of data-protection issues in employees require gender-specific approaches. Another issue that merits investigation is the source of the influence of hospital type on data-protection compliance.

[1]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[2]  I. Ajzen,et al.  Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .

[3]  Icek Ajzen,et al.  Attitudes, personality, and behavior / Icek Ajzen , 1988 .

[4]  Klaus Pommerening Datenschutz in Krankenhausinformationssystemen , 1995, VIS.

[5]  P. Ellen,et al.  The Role of Perceived Consumer Effectiveness in Motivating Environmentally Conscious Behaviors , 1991 .

[6]  Irene M. Y. Woon,et al.  Forthcoming: Journal of Information Privacy and Security , 2022 .

[7]  I. Ajzen The theory of planned behavior , 1991 .

[8]  Jacqueline J. Kacen,et al.  The Influence of Culture on Consumer Impulsive Buying Behavior , 2002 .

[9]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[10]  R. W. Rogers,et al.  Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .

[11]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[12]  Jeffrey M. Stanton,et al.  Examining employee compliance with organizational surveillance and monitoring , 2006 .

[13]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[14]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[15]  I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .

[16]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[17]  Thomas Würtenberger Die Akzeptanz von Gesetzen , 1999 .

[18]  Youngjin Yoo,et al.  It's all about attitude: revisiting the technology acceptance model , 2004, Decis. Support Syst..

[19]  Leo R. Vijayasarathy,et al.  Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..

[20]  Fred D. Davis,et al.  A Model of the Antecedents of Perceived Ease of Use: Development and Test† , 1996 .

[21]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[22]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[23]  Paul A. Pavlou,et al.  Predicting E-Services Adoption: A Perceived Risk Facets Perspective , 2002, Int. J. Hum. Comput. Stud..

[24]  Klaus-Helmut Schmidt,et al.  Psychometrische Eigenschaften und Validität einer deutschen Fassung des "Commitment"-Fragebogens von Allen und Meyer (1990). , 1998 .

[25]  Detmar W. Straub,et al.  Testing the technology acceptance model across cultures: A three country study , 1997, Inf. Manag..

[26]  Cynthia K. Riemenschneider,et al.  Understanding it adoption decisions in small business: integrating current theories , 2003, Inf. Manag..

[27]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[28]  Pascale G. Quester,et al.  Who's afraid of that ad? Applying segmentation to the protection motivation model , 2004 .

[29]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[30]  Ritu Agarwal,et al.  Practicing Safe Computing: A Multimedia Empirical Examination of Home Computer User Security Behavioral Intentions , 2010, MIS Q..

[31]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[32]  Dennis F. Galletta,et al.  Extending the technology acceptance model to account for social influence: theoretical bases and empirical validation , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[33]  Burcu Bulgurcu,et al.  The antecedents of information security policy compliance , 2008 .

[34]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[35]  Qing Hu,et al.  User behaviour towards protective information technologies: the role of national cultural differences , 2009, Inf. Syst. J..

[36]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[37]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[38]  A. B. Zakour,et al.  Cultural Differences and Information Technology Acceptance , 2004 .

[39]  Daniel Robey,et al.  User Attitudes and Management Information System Use , 1979 .

[40]  Stuart A. Youngblood,et al.  Bad apples in bad barrels: A causal analysis of ethical decision-making behavior. , 1990 .

[41]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[42]  John P. Meyer,et al.  The measurement and antecedents of affective, continuance and normative commitment to the organization , 1990 .

[43]  Paul A. Pavlou,et al.  What Drives Electronic Commerce across Cultures? Across-Cultural Empirical Investigation of the Theory of Planned Behavior , 2002, J. Electron. Commer. Res..

[44]  Fred D. Davis,et al.  A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.

[45]  A. Bandura Social learning theory , 1977 .

[46]  Stephen Sutton,et al.  Cambridge Handbook of Psychology, Health and Medicine: Theory of planned behaviour , 2007 .

[47]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..